This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security.

Computing and Internet security are everyone’s business, but it’s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.[Read more…] about Lynda – IT Security Foundations – Core Concepts

Until July 3rd you will get free voucher worth $49 for CISS (Certified IT Security Academy) EXAM!
Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.[Read more…] about Udemy – IT Security Beginner 2.0- Certified Hacking Training

Foundations of IT Security Operating System Security
English | Size: 214.62 MBCategory:IT Security

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email. [Read more…] about Foundations of IT Security Operating System Security

Foundations of IT Security Network Security
English | Size:273.30 MBCategory:IT

Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization’s network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building’s perimeter and the hardware within. [Read more…] about Foundations of IT Security Network Security

Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. In this IT Security Fundamentals course by Certified Information Systems Security Professional (CISSP) and certified ethical hacker (CEH) Mike Danseglio, you’ll learn how to perform these tasks properly and in alignment with industry best practices-a skill that’s critical to virtually every technology role, from decision maker to developer. [Read more…] about Lynda – IT Security Fundamentals

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email.[Read more…] about Foundations of IT Security Operating System Security